It's a brand new research arena in information security.
非技术手段是信息安全中的一个崭新研究方向。
Thus, certification is an important issue in information security field.
可见,认证技术在信息安全领域具有举足重轻的地位。
Digital watermarking is a new data hide technology in information security domain.
数字水印是一种全新的信息安全技术。
Therefore, chaos-based encryption techniques play an increasing role in information security.
因此,基于混沌的密码技术在信息安全方面具有重要的地位。
Degree required: Associate's or bachelor's degree in computing or certifications in information security.
文凭要求:计算机学士学位或大专学位,或信息安全认证。
Block cipher is one of the most important encryption and decryption algorithms in information security.
分组密码算法是信息安全领域中最为重要的加解密技术之一。
The thesis researches on the identity authentication and access control in information security technology.
本文从身份认证、访问控制等方面对信息安全的相关技术进行了分析和研究。
Therefore, the research on ECC and its applications are becoming new highlight in information security field.
因此,ECC及其应用正在晋升为信息安全研究领域新的热点。
This paper mainly discusses the watermark technique applied in information security concerning digital image.
本论文主要探讨有关数字图像信息安全中的数字水印技术。
In this paper, using SSL protocol we mainly research on the application of PKI in information security on network.
以PK I技术为基础,应用ssl协议,研究PK I技术在保障网络信息传输安全上的应用。
Those factors are leading to a crisis in information security that will demand new solutions from the security specialists.
这些因素导致了信息安全危机,从而需要来自安全专家的新的解决方案。
Play in information security Cryptography plays an important role in information security has become an important part.
在信息安全中起着举足轻重作用的密码学也就成为信息安全中不可或缺的重要部分。
The network information security defensive system is a important problem in information security domain for recent years.
网络信息安全防御体系是近年来信息安全领域探讨的一个重要问题。
After current problems being solved, encrypted file system will have broad application prospect in information security field.
加密文件系统如能克服现有的一些缺点,将来必能在信息安全领域有广阔的应用前景。
This research is helpful to the application of stream cipher algorithm in information security and modern secure communication equipment.
该研究结果有助于序列密码算法在信息安全及现代保密通信设备中的应用。
Personal identity authentication is a key part in information security architecture and also the premise of the integral information security.
个人身份认证是信息安全体系中一个非常关键的环节。
Grading protection is an important tenet in information security technology. This tenet is also applicable to the network disaster-tolerant system.
等级保护是信息安全技术的重要原则之一,作为信息安全重要组成部分的网络容灾系统同样要遵循这一原则。
Intentional delete or accidental delete always leads to computer data loss. Data recovery plays an important role in information security protection.
恶意删除或数据误删现象时常发生,数据恢复的成败关系到信息的安全。
Quantum key distribution technique is a popular research subject in information security field, which is based on Heisenberg's uncertainty principle and no-clone theory.
量子密钥分配技术是信息安全中最热门的研究课题,它起源于量子力学中的测不准原理和未知量子态的不可克隆定理。
BCH codes are a subset of the class of linear block codes that have good error correction capability. Information hiding is a new technique in information security field.
BCH纠错编码是线性分组码的一种,有较好的纠错能力,信息隐藏是近年来信息安全领域出现的新技术。
The intrusion detection technique is an important method to insure the computer network security. It is becoming one of hot research topics in information security field.
入侵检测技术作为确保计算机网络信息安全的一个重要手段正成为信息安全领域的研究热点之一。
This method can be used in other continuous chaotic system and the application of chaotic system in information security and secure communication field will be accelerated.
该法可应用于其他连续混沌系统中,有助于加快混沌系统在信息安全及保密通信网络领域中的应用。
If you are (or were) already working in information technology, you can pursue career training specifically in information security through online degree and certification programs.
如果你现在正在(或曾经在)信息产业工作,你可以参加在线信息安全的培训,获得在线学位或证明。
Random number is always chosen by the participant in information security protocol, which can not be verified by other participants, so that the fairness of protocol is affected.
信息安全协议中使用的随机数通常由协议参与者任意选取,其他参与方无法验证,从而影响协议的公平性。
Therefore, the access control becomes one of the essential functions in information security and is to protect the storage and handling of information in enterprise information system.
因此,访问控制成为信息安全必不可少的功能之一,其目的是为了保护企业在信息系统中存储和处理的信息的安全。
The ASIP, which features the high efficiency of ASIC co-processor and the flexibility of General Purpose Processor, has and will have popular application in information security domain.
专用指令集处理器(ASIP)结合了ASIC协处理器的高效性与通用处理器的灵活性,在信息安全领域具有广泛的应用前景。
The information security risk evaluation question is elaborated, the major methods in information security risk evaluation fields are introduced, and the methods are analyzed and studied.
阐述了信息安全风险评估所要解决的问题,介绍了目前在信息安全风险评估领域的主要方法,并对这些方法进行了分析和评价。
The information security risk evaluation question is elaborated, the major methods in information security risk evaluation fields are introduced, and the methods are analyzed and studied.
阐述了信息安全风险评估所要解决的问题,介绍了目前在信息安全风险评估领域的主要方法,并对这些方法进行了分析和评价。
应用推荐